CVE-2026-31717 PUBLISHED

ksmbd: validate owner of durable handle on reconnect

Assigner: Linux
Reserved: 09.03.2026 Published: 01.05.2026 Updated: 01.05.2026

In the Linux kernel, the following vulnerability has been resolved:

ksmbd: validate owner of durable handle on reconnect

Currently, ksmbd does not verify if the user attempting to reconnect to a durable handle is the same user who originally opened the file. This allows any authenticated user to hijack an orphaned durable handle by predicting or brute-forcing the persistent ID.

According to MS-SMB2, the server MUST verify that the SecurityContext of the reconnect request matches the SecurityContext associated with the existing open. Add a durable_owner structure to ksmbd_file to store the original opener's UID, GID, and account name. and catpure the owner information when a file handle becomes orphaned. and implementing ksmbd_vfs_compare_durable_owner() to validate the identity of the requester during SMB2_CREATE (DHnC).

Product Status

Vendor Linux
Product Linux
Versions Default: unaffected
  • affected from c8efcc786146a951091588e5fa7e3c754850cb3c to 00ce8d6789dae72d042a4522264964c72891ca37 (excl.)
  • affected from c8efcc786146a951091588e5fa7e3c754850cb3c to c908c853f304a4969b5aa10eba0b50350cc65b80 (excl.)
  • affected from c8efcc786146a951091588e5fa7e3c754850cb3c to 49110a8ce654bbe56bef7c5e44cce31f4b102b8a (excl.)
  • Version 8df4bcdb0a4232192b2445256c39b787d58ef14d is affected
Vendor Linux
Product Linux
Versions Default: affected
  • Version 6.9 is affected
  • unaffected from 0 to 6.9 (excl.)
  • unaffected from 6.18.25 to 6.18.* (incl.)
  • unaffected from 7.0.2 to 7.0.* (incl.)
  • unaffected from 7.1-rc1 to * (incl.)

References